Academic Journals Database
Disseminating quality controlled scientific knowledge

Hierarchical Attribute-Based Secure Outsourcing for Malleable Access in Cloud Computing

Author(s): S. Usha#1 , Dr. A. Tamilarasi#2 , K. Mahalakshmi

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 6;
Start page: 2594;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Cloud Computing | Access Control | Secure data storage

This paper is an attempt to provide an enhanced data storage security model in Cloud Computing and creating a trust environment in cloud computing. There are a lot of compelling reasons for businesses to deploy cloud-based storage. For a new business, start-up costs are significantly reduced because there is no need to invest capital up front for an internal IT infrastructure to support the business. By far, the number one question clients considering a move to cloud storage ask is whether or not their data will be secure. Storing data offsite doesn’t change data security requirements; they are the same as those facing data stored onsite. Security should be based on business requirements for specific applications and data sets, no matter where the data is stored. We believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. In this paper, we investigated the problem of data security in cloud data storage, to ensure the correctness of clients’ data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for mallable Access in Cloud computing which also ensures data storage security and survivability thereby providing trust environment to the clients. To combat against unauthorized information leakage, sensitive data have to be encrypted before outsourcing so as to provide end-to-end data confidentiality assurance in the cloud and beyond. We have reduced the computation time due to key size by implementing ECDSA algorithm for Cryptographical operations. Also we use push mail algorithm for key exchange between owner and consumer. It enhances the security in the proposed model effectively.

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions